نتایج جستجو برای: organizational requirements for performing risk management processes consist of management
تعداد نتایج: 22894565 فیلتر نتایج به سال:
1. EXECUTIVE SUMMARY In this contribution we state the following thesis: The concept of federation represents a promising way to ease the establishment and operation of organizational and technical issues of identity management at a university. This concept fits well for most universities due to the fact that typically universities consist of " somewhat " independent organizational units like l...
Government is facing numerous problems one of them is the lack of coordination in business processes. However, due to the size of the government, complexities and diversifications processes are hard to document, update and improve. This causes serious inefficiencies in managing the organizations which motivates process improvement and re-engineering. The first step to accomplish this goal is pr...
Managing tasks accruing in the context of the student life cycle in higher education requires effective and transparent organizational processes as well as a powerful information technology (IT) support. Both aspects are the fundamental components of a university-wide project named “PuL” at RWTH Aachen University. Primarily, the project aims at describing optimized processes in examination and ...
The challenges and realities in applying effective software risk management processes are difficult, in particular integrating the risk management processes into software development organizations. However, the benefits of implementing effective risk management tools and techniques in software development project are equally great. Current perceptions and emerging trends of various software ris...
Background and Objectives: In recent decades medical errors have become a major issue for scientific investigation to avoid potential harmful failures threatening patients’ health and safety. Developing risk management culture has been considered not only to play an important role in detecting and coping effectively with such errors but also lead to high level ...
One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...
Background: Emergency ward nurses exposed to occupational hazards. Job Safety Analysis (JSA) is a way to identify and assessment job-related risks and provide control strategies to reduce risks. The purpose of this study was to evaluate Job Safety Analysis and compare the effectiveness of control (engineering and management) interventions in emergency nursing. Methods: This is an interventiona...
chapter one is devoted to a moderate discussion on preliminaries, according to our requirements. chapter two which is based on our work in (24) is devoted introducting weighted semigroups (s, w), and studying some famous function spaces on them, especially the relations between go (s, w) and other function speces are invesigated. in fact this chapter is a complement to (32). one of the main fea...
Software processes cover many different aspects and facets: the management of activities, products, organizational constraints, resources, software configuration management, distribution, evolution strategies, cooperation work, etc. The requirements for a process support environment include (1) providing formalisms/languages which are abstract enough for capturing and modeling the company strat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید